(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

DATABASE AGENCY PARTITIONING USING SECURITY GROUPS

Publishing Venue

Motorola

Related People

Authors:

Stan Dorcey•Anne Marie Johlie•Larry Peterson•Tim Sherburne

Abstract

Currently in trunked radio systems, any user who can login to the management terminal may view any information within the database. As radio sys- tems become increasingly large, complex and expen- sive, it is likely that several groups, or agencies, will share a trunked radio system. However, these agen- cies may wish to protect their portion ofthe database from access by other users of the system. By implementing an Agency Partitioning scheme, agen- cies see only the elements of the database that they have access to.

Copyright

Motorola Inc. July 1995

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
59% of the total text.

Page 1 of 2

MOlVROLA Technical Developments

DATABASE AGENCY PARTITIONING USING SECURITY GROUPS

by Stan Dorcey, Anne Marie Johlie, Larry Peterson and Tim Sherburne

BACKGROUND

Currently in trunked radio systems, any user who can login to the management terminal may view any information within the database. As radio sys- tems become increasingly large, complex and expen- sive, it is likely that several groups, or agencies, will share a trunked radio system. However, these agen- cies may wish to protect their portion ofthe database from access by other users of the system. By implementing an Agency Partitioning scheme, agen- cies see only the elements of the database that they have access to.

Using the security systems that are implemented by relational database packages, users may only be restricted access to database tables. However, a sin- gle row of a database table is considered to be a 'managed object' within the radio system database and is therefore the desired partition unit.

SOLUTION

In order to implement a database partitioning

scheme within a radio system, a new logical object called a security group is defined. A security group is simply a container object for other objects within the radio system database. Every managed object within the database must be associated with a secu- rity group.

In order to login to the radio system manage- ment terminal, a user account must exist. Within the definition ofa user account are a list ofthe secu- rity groups to which the use...